The cinematic costume is a qualitative element that transcends the direct function of it. It is an active personality that can become a brand of publicity and transformative signs that dismantle the intellectual system of acts, characters and events and reconstructs them aesthetically. For this reason, the researcher identified the subject of his research with the following address: (cinematic costumes between the function of publicity and Semiotics Significance). The researcher divided the research into the following: The methodological framework. The theoretical framework: The researcher divided it into three topics: the first topic: publicity. Function and concept. The second topic: fashion text and significance. The third topic: the labeling and then sealing the indicators. Then the research procedures: The researcher tackled the research methodology and tools, as well as the analysis unit, the sample of the research, and the sample analysis, which is the American film (Murder on the Orient Express 2017). Depending on the indicators. Then findings and conclusions, and conclude the search with a list of sources
Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.
Gaining the relationship between the central government and local governments is great importance especially after the expanded functions of the central government and became unable to carry out their works without all that delegate or transfer parts of its powers to lower levels.
The aims of the research is to determine the relationship of the central government with the local government in accordance with the principle of administrative decentralization with the presentation of the competent authorities, the control of local governments, according to the Provincial Council Act No. 21 of 2008 amended.
The research has a problem that has been the relationship of the central
... Show MoreThe aim of this paper is to estimate a nonlinear regression function of the Export of the crude oil Saudi (in Million Barrels) as a function of the number of discovered fields.
Through studying the behavior of the data we show that its behavior was not followed a linear pattern or can put it in a known form so far there was no possibility to see a general trend resulting from such exports.
We use different nonlinear estimators to estimate a regression function, Local linear estimator, Semi-parametric as well as an artificial neural network estimator (ANN).
The results proved that the (ANN) estimator is the best nonlinear estimator am
... Show MoreCeremony of the Koran vocabulary animate different connotations unique style patch on
smth not any method of Arabs, has been used used vocabulary and special Madza, he put
every single in place of installation so that if you do not put in place misfire meaning and
became Rkika method. Our goal in this research study a range of vocabulary in terms of the
implications and documenting the trial of the Hadith and sayings of the beneficiaries of Arab
scholars have different attitudes, linguists and interpreters and speakers and fundamentalists,
philosophers, and others.
The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show MoreMaximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.
The interest of this paper is that
... Show Morestudy aimed to recognize the relationship shyness and depression and to recognize the differences between the genders, according to the variable of shyness and depression, the sample consisted (214) students, (141) female (73) male, and the sample responded scale of shyness and Inventory beck for depression, The Results of this study show that: the sample has a low degree shyness and a high degree depression, . There are no statistically significant differences according to gender variable in shyness, and there are statistically significant differences according to gender variable in depression favor for male, and there are statistically significant relationships between the variables of the study at lev
... Show MoreWe can summarize the main risk factors for type 2 diabetes mellitus (T2DM) by looking at our nutrition, age, and lifestyle. β-cell dysfunction and insulin resistance (IR) are outcomes of the pathophysiology of type 2 diabetes. As an indirect result of IR on important metabolic enzymes, lipid and lipoprotein abnormalities are also a factor in T2DM patients. Recent research has indicated that lipid fluctuation may be the cause of poor glucose metabolism as well as one of its effects. Fatty acids (FAs) affect cell membrane fluidity and permeability, insulin receptor binding and signaling, and the translocation of glucose transporters. Therefore, it is suggested that FAs might play a crucial part in the emergence of IR and T2DM.